Slip Plixer's name in there, because it's their product.

unstable
sinn3r 2012-08-07 12:20:44 -05:00
parent 0f37c1704d
commit 57c32c9c7b
1 changed files with 1 additions and 1 deletions

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={})
super(update_info(info,
'Name' => "Dell SonicWALL Scrutinizer 9 SQL Injection",
'Name' => "Dell SonicWALL (Plixer) Scrutinizer 9 SQL Injection",
'Description' => %q{
This module exploits a vulnerability found in Dell SonicWall Scrutinizer.
While handling the 'q' parameter, the PHP application does not properly filter